Tuesday, December 30, 2014

These data encryption tools have tormented … – Computerworld


 
 
 Since then, the two above-mentioned tools detected different sensitivity. First identified in Tor (thanks to the FBI could track users using the services of the network), and the second application Tail (which allowed hackers to capture IP addresses assigned to users of its services). So far, only the TrueCrypt application failed to find any vulnerabilities that would allow her to figure out (at least do not know about that, because some say it is different).

For no one should be no surprise that, NSA that depend most on the break just these tools. Recently revealed that applications developed by NSA XKeyScore (used to capture Internet traffic) detected a mechanism for determining who uses the services of portals Tor and Tails. This reinforces the belief that the agency was interested in – and it’s very hard – these tools.

See also:

A report published by Der Spiegel document contains information confirming the suspicion that the NSA had targeted these applications. She viewfinder is an understatement – it necessarily wanted to figure out, in order to be able to steal data from servers that have used these tools for their protection.

The tools have been classified by the NSA, taking into account, inter alia, for example. Degree their advancement. Whereas this criterion, the first three places were taken by Tor applications, Tails and TrueCrypt. I took them agency unless indeed, as indicated by the fact that, with the amount in 2013, more than $ 10 billion, US $ 34.3 million has been spent on the project “cryptanalysis and Exploitation Services”.

There are of course This hard evidence that it is the NSA could be found in applications that track and Tails susceptibility to enable interception and decryption of data, but this is highly unlikely. There are speculations that the agency also figured TrueCrypt application. Proponents of this kind of conspiracy theory believe that they are so indirect evidence. The idea is that developers avoid this solution as if instinctively felt that it is not safe, although officially no audit has not demonstrated that it may contain a hole.

Among other tools, the agency placed on the aforementioned list (thinking that maybe they are not as important as Tor and Tails and TrueCrypt, but you should take care of them) is Redphone program. This tool supports applications transmitting voice, data encryption using ZRTP (whose creator Phil Zimmermann). Zimmermann has developed two decades ago, another tool for data encryption, bearing the name of the PGP (Pretty Good Privacy). It turns out that the NSA is also a tool to put it drew up the list of most dangerous for the data encryption systems.

It is interesting that the NSA had – and probably is – a lot of problems with unstructured data. At least that can be inferred from published by Der Spiegel document. It is worth remembering that the document was created in 2012 and since then a lot of things could change. About this we will, however, only when it finds a second Snowden and reveals another document showing the latest methods of work of the NSA.
 
 
 
 
 

Welcome to conferences and workshops
 


 
  19 February 2015.
 
  Sign up
 

 Complement fixed speeches at the conference in 2015 Techworld e-seminars will be delivered online via the Internet. In this electronic form will provide information relating to these aspects of infrastructure that is difficult to show on stage. Participants will learn about such aspects as the implementation process, some technical details, and also shown live elements discussed infrastructure. E-seminars are conducted in an inte ractive format, so …

LikeTweet

No comments:

Post a Comment